2 Secure Installation and Configuration

This chapter outlines the planning process for a secure installation and describes several recommended deployment topologies for the system.